Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views [desc] Posted
    Thread: Word-4digits-symbol-word
Post: Word-4digits-symbol-word

I have an MD5 hash that is in the following format: ?u?l?l?l?s?d?d?d?d?u?l?l?l?l?l?l [Word][symbol][4 digits][Different Word] Is there any way to run a left/right dictionary with rules to brute t...
mrmike hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 0 743 01-26-2020, 04:08 PM
    Thread: Hashcat Brain
Post: Hashcat Brain

Does brain remember everything that has been attempted? For example if I run a dictionary attack, and then run a bruteforce attack with rules with overlapping candidates, would those candidates b...
mrmike hashcat 5 2,295 05-26-2019, 11:40 AM
    Thread: Hashcat Brain
Post: RE: Hashcat Brain

I found the above tests had an unexpected result, however with "--brain-client-features 3" it works as expected. For some reason I thought that was enabled by default. Thanks! Not sure if WPA is consi...
mrmike hashcat 5 2,295 05-26-2019, 12:40 PM
    Thread: Restore value is greater than keyspace
Post: Restore value is greater than keyspace

Code: -- hashcat64.exe -a 3 -m 0 [xx.hash.xx] masks\my_mask.hcmask -w 4 --status -- Quote: -- Session..........: hashcat Status...........: Exhausted Hash.Type........: MD5 Hash.Target......: ...
mrmike hashcat 6 2,887 06-01-2019, 03:06 PM
    Thread: Restore value is greater than keyspace
Post: RE: Restore value is greater than keyspace

Good catch! You're theory also works with the example I gave above, from keyspace 67,600,000 to 10,194,220,608. I hope you guys don't have too much headache with a fix.
mrmike hashcat 6 2,887 06-02-2019, 03:42 PM
    Thread: Restore value is greater than keyspace
Post: RE: Restore value is greater than keyspace

Sorry, I was using the 'actual' keyspace, and also the mask before instead of mask after, when using the --keyspace flag: Mask 1592: 580,008 Mask 1593: 67,600
mrmike hashcat 6 2,887 06-02-2019, 03:59 PM
    Thread: Triple Dictionary Attack
Post: Triple Dictionary Attack

Using oclhashcat, is there a way to use a 3 dictionary combinator attack? Separating each work with a hyphen?
mrmike General Help 1 3,572 04-17-2016, 05:15 PM
  Sad Thread: Help with simple mask
Post: Help with simple mask

Why is this working? Code: -- hashcat-cli64.exe --stdout -a 3 -m 0 hash.txt -i -1 ?u ?1?1?1?1?1?1?1?1 -- It seems to be using the hash as charset
mrmike Old hashcat Support 4 6,365 04-10-2016, 06:26 PM
    Thread: Help with simple mask
Post: RE: Help with simple mask

Actually, when I remove --stdout it seems to work fine.
mrmike Old hashcat Support 4 6,365 04-10-2016, 06:32 PM
    Thread: Help with simple mask
Post: RE: Help with simple mask

Xanadrel Wrote: (04-10-2016, 06:31 PM) -- I don't think you know what --stdout does. -- Evidently, I thought it was a way to see what is being generated.
mrmike Old hashcat Support 4 6,365 04-10-2016, 06:33 PM
  Question Thread: Excel Password Hash Extraction
Post: Excel Password Hash Extraction

I have an xlsx file that is not encrypted but still requires a password to enable editing. https://i.imgur.com/4efCwqY.png Using office2hashcat gives me an error: Quote: -- holiday.xlsx : zip ...
mrmike General Talk 3 7,356 08-14-2017, 07:10 PM